Use normal web pentest tools to hack Websockets
☆18Sep 23, 2019Updated 6 years ago
Alternatives and similar repositories for websocket-harness
Users that are interested in websocket-harness are comparing it to the libraries listed below
Sorting:
- Simple scripts aiding penetration testing process☆15Mar 10, 2020Updated 5 years ago
- Tool to pentest spark clusters☆32Jun 26, 2024Updated last year
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Study and research with your docs, media, and AI in one place☆33Updated this week
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆20Dec 18, 2025Updated 2 months ago
- ☆13Nov 5, 2024Updated last year
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- ☆16May 13, 2021Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- ☆19Jan 15, 2026Updated last month
- A list of all projects by UW CSE students.☆11Feb 8, 2016Updated 10 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- [NAACL'25] "Revealing the Barriers of Language Agents in Planning"☆13Jun 22, 2025Updated 8 months ago
- A simple Sinatra app to test when an image is opened.☆11Feb 6, 2014Updated 12 years ago
- POC for checking multiple hosts for Zerologon vulnerability☆11Oct 5, 2020Updated 5 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆11May 2, 2022Updated 3 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Ready to go Phishing Platform☆57Oct 15, 2024Updated last year
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- The repository for papaer "Distance between Relevant Information Pieces Causes Bias in Long-Context LLMs"☆14Dec 16, 2024Updated last year
- BookWorm: A Dataset for Character Description and Analysis [EMNLP Findings 2024]☆14Feb 28, 2025Updated last year
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- AI-Powered RSS Content Filter - Automatically remove ads, sponsored content, and low-quality articles from your FreshRSS feeds using LLM …☆27Nov 1, 2025Updated 4 months ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- A realtime speech to text diarization system to gather and interleave speech from multiple speaker audio.☆26Jan 29, 2026Updated last month
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago